Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[META] Cryptographic agility for Sigstore clients and services #16

Open
10 tasks
woodruffw opened this issue Jan 21, 2025 · 3 comments
Open
10 tasks

[META] Cryptographic agility for Sigstore clients and services #16

woodruffw opened this issue Jan 21, 2025 · 3 comments
Labels
enhancement New feature or request

Comments

@woodruffw
Copy link
Member

Hi everyone! I figure most people are aware of aspects of this work, but I'm filing a meta-issue as a permanent record with (hopefully) enough details to fill everything in 🙂

TL;DR: My colleagues and I (at @trailofbits) are currently working on a handful of different features/changes to the (Go) clients and services (i.e. Rekor & Fulcio) to enable cryptographic agility across an agreed-upon common suite of algorithms. The ultimate vision for this is enabling a post-quantum (PQ) posture for the Sigstore ecosystem. The current plan is to prove out our approach to agility with a non-PQ addition (namely Ed25519{,ph}), with the plan to add a PQ suite once we have suitable assigned numbers (IANA or otherwise).

Here's what we have currently planned, and are currently working on:

The above is listed in rough order of priority: our plan is to tackle shared components/APIs first (e.g. sigstore/sigstore), followed by services, followed by Go clients. As always, we eagerly welcome any feedback or thoughts on this approach!

cc for viz: @cmurphy @bobcallaway @codysoyland @haydentherapper @loosebazooka @steiza

@woodruffw woodruffw added the enhancement New feature or request label Jan 21, 2025
@bobcallaway
Copy link
Member

@sigstore/core-team FYI

@jku
Copy link
Member

jku commented Jan 21, 2025

For completeness:

  • TUF clients and root-signing are cryptographically agile already, at least in theory. In practice this depends on what the used hardware keys and KMSs support (just like with many things on the above list)

@trishankatdatadog
Copy link

  • TUF clients and root-signing are cryptographically agile already, at least in theory. In practice this depends on what the used hardware keys and KMSs support (just like with many things on the above list)

Precisely. Also, I think we should be able to easily reuse the Sigstore Trusted Root here to upgrade/deprecate/remove which algorithms are supported over time.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants